NuHarbor Security
  • Solutions
    Solutions
    Custom cybersecurity solutions that meet you where you are.
    • Overview
    • Our Approach
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • By Business Need
      • Identify Gaps in My Cybersecurity Plan
      • Detect and Respond to Threats in My Environment
      • Fulfill Compliance Assessments and Requirements
      • Verify Security With Expert-Led Testing
      • Manage Complex Cybersecurity Technologies
      • Security Monitoring With Splunk
    • By Industry
      • State & Local Government
      • Higher Education
      • Federal
      • Finance
      • Healthcare
      • Insurance
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Services
    Services
    Outcomes you want from a team of experts you can trust.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Security Testing
      • Penetration Testing
      • Application Penetration Testing
      • Vulnerability Scanning
      • Wireless Penetration Testing
      • Internal Penetration Testing
      • External Penetration Testing
    • Assessment & Compliance
      • CMMC Compliance
      • NIST 800-53
      • HIPAA Security Standards
      • ISO 27001
      • MARS-E Security Standards
      • New York Cybersecurity (23 NYCRR 500)
      • Payment Card Industry (PCI)
    • Advisory & Planning
      • Security Strategy
      • Incident Response Planning
      • Security Program Reviews
      • Security Risk Assessments
      • Virtual CISO
      • Policy Review
    • Managed Services
      • Curated Threat Intelligence
      • Managed Detection and Response (MDR)
      • Sentinel Managed Extended Detection and Response (MXDR)
      • SOC as a Service
      • Splunk Managed Services
      • Tenable Managed Services
      • Vendor Security Assessments
      • Vulnerability Management
      • Zscaler Support Services
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Partners
  • Resources
    Resources
    Explore reports, webinars, case studies, and more.
    • Browse Resources
    • Consultation Icon Consult with an expert
    • Blog icon Blog
    • Podcast icon Podcast
    • Annual SLED CPR icon Annual SLED CPR
    • Downloadable Assets icon Downloadable Assets
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Company
    Company
    We do cybersecurity differently – the right way.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Leadership
    • News
    • Careers
    • Contact
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Consult with an expert
  • Client support
  • Careers
  • Contact
1.800.917.5719
NuHarbor Security Blog
    • Compliance
    • Cybersecurity Technology
    • Security Operations
    • Industry Insights
    • Security Testing
    • Advisory and Planning
    • Application Security
    • Managed Detection and Response
    • Threat Intelligence
    • NuHarbor
    • Managed Services
    • Cyber Talent
January 25, 2022

Sharing Threat Intelligence Is Caring – Unless It's With the Attackers!

Justin Fimlaid Justin Fimlaid

For as long as I've been in cybersecurity, we've this "thing" about sharing threat intelligence. this is even more apparent in state and local government, as the public sector leans towards collaboration. There are two main drivers behind the sharing: one is enriching the cybersecurity community, and the other is a security flex to show your peers the security goodness you can generate, communicate, and accumulate. Most entities I know are sincere about the first motivation, but many aspire to the notoriety of the second.

The complication – and I think we can all agree – is that threat intelligence has a limited shelf life, meaning that the value and uniqueness of threat intelligence evaporates quickly. Attacks shift, the cyber landscape changes, and within a couple days the threat intelligence is old news. Because of this, security leaders need to maintain threat intelligence feed hygiene in order to avoid generating false alerts and chasing events that are ultimately a waste of time. This is especially true in state and local government because security resources are few and you can't have staff chasing ghosts. I've seen those pursuits too many times, and it's a sad tale.

Today's method of sharing threat intelligence is very public. You can share it, you can enrich communities, and you can buy it. Problematically, and this is also true for commercial entities, when you share it, everyone sees it, including the person or organization perpetuating or planning an attack.

Instead, imagine a world where a vetted threat intelligence sharing framework exists, using public-private key pairs, ensuring that only trusted entities and organizations can view the threat intelligence. Why would that matter? I'll tell you.

Threat intelligence is simply an artifact of what's known: known vulnerabilities, known attack techniques, and known compromises. Successful attackers thrive in a different world, the world of the unknown and undetected threat. The longer they go undetected, the more data they can exfiltrate. They evolve their techniques to remain undetected, and the fact we publicly identify them in threat intelligence feeds just forces them to evolve. Old attack techniques retire into college curriculums as table stake exploits, fun for script kiddies, and provide opportunistic hack drive-bys against companies who don't have even modest funding for cybersecurity.

Enter state and local government. These public servants struggle to maintain talent and resources capable of keeping up with the current threat landscape and can’t afford the effort to stay ahead of evolving attack techniques.

The way we share threat intelligence through public feeds, which are often stale, disrupts and erodes our ability to fight future cybercrime. It would be like our military publicly sharing threat intelligence on potential attacks and indicators of compromise in military personnel lines. Doing that would immediately tell our enemies where they've been detected and how to evolve to evade detection next time. In another example, the Enigma machine used by Nazi Germany in World War II allowed the German Army to share communications securely with a purpose. They were very successful until the Allied armies broke the Enigma code. Once that code was broken, the German Army was unknowingly communicating publicly (to the Allies) on their tactics and techniques. This allowed the Allies to evolve their own strategies to remain undetected and effective. It wasn't long after the Enigma machine code was broken that the tides of war changed.

When it comes to threat intelligence, we in the cybersecurity industry knowingly share everything. We tell our enemies and attackers what techniques work and which don't. Trust me when I say attackers appreciate the tips on detection so they can better use their time and money. After all, cybercrime is their business.

So, what's the answer to threat intelligence sharing? Most good answers require mass coordination of robust and secure sharing infrastructure and secure communities. It may seem aspirational, but it already exists, just not in ways you'd expect. It exists among local security companies that actually focus on cybersecurity and have invested in a threat intelligence framework. At NuHarbor, we have threat intelligence frameworks that are integrated and private to our clients. Each client we add makes the threat intelligence ecosystem and network stronger. It allows our client to see attacks sooner and allows us to respond faster, all without tipping off attackers. Together with our clients, we benefit greatly from this expanded view of the threats that everyone has to deal with.

Threat intelligence as a discipline requires a lot of focus. Done right, it can save you time and money. Done poorly, it can be like catching smoke. If you're looking for a cybersecurity partner with the threat intelligence capabilities and one of the largest state and local government threat intelligence ecosystems, contact us today.

Included Topics

  • Threat Intelligence,
  • Security Operations
Justin Fimlaid
Justin Fimlaid

Justin (he/him) is the founder and CEO of NuHarbor Security, where he continues to advance modern integrated cybersecurity services. He has over 20 years of cybersecurity experience, much of it earned while leading security efforts for multinational corporations, most recently serving as global CISO at Keurig Green Mountain Coffee. Justin serves multiple local organizations in the public interest, including his board membership at Champlain College.

Related Posts

1 min read
Third-Party Security in the Healthcare Industry [Infographic] Read More
1 min read
New FFIEC rule that Banks must defend against DDOS, a change in times? Read More
Industry Insights 2 min read
Transformative Leaders Are the Key to Success in SLED Cybersecurity – Get the Full Report Read More

Subscribe via Email

Subscribe to our blog to get insights sent directly to your inbox.

Subscribe Here!

Latest Pwned episodes

Episode 200 - Reflections of Pwned...Until Next Time
April 03, 2024
Episode 200 - Reflections of Pwned...Until Next Time
Listen Now
Episode 199 - When a BlackCat Crosses Your Path...
March 21, 2024
Episode 199 - When a BlackCat Crosses Your Path...
Listen Now
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
March 08, 2024
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
Listen Now
NuHarbor Security logo
NuHarbor Security

553 Roosevelt Highway
Colchester, VT 05446

1.800.917.5719

  • Solutions
  • Services
  • Partners
  • Resources
  • Company
  • Contact
  • Privacy Policy
Connect
  • Twitter
  • Linkedin
  • YouTube
©2025 NuHarbor Security. All rights reserved.